hieuha / WIFI-ShieldLinks
Protect your privacy and security online
☆10Updated 9 years ago
Alternatives and similar repositories for WIFI-Shield
Users that are interested in WIFI-Shield are comparing it to the libraries listed below
Sorting:
- a MITM attack tool☆85Updated 10 years ago
- Various malware, packer, crypter, etc. detection and analysis tools☆90Updated 10 years ago
- Clone of hidden tear written in C++☆70Updated 5 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51Updated 9 years ago
- The educational Animus malware☆18Updated 6 years ago
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆63Updated 7 years ago
- Practice and learning in the world of C RE and exploit analysis☆33Updated 7 years ago
- A project to learn about malware and c++ coding☆23Updated 10 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Updated 11 years ago
- ☆15Updated 7 years ago
- Simple Bash Rasomware for use in Cyber Exercises☆116Updated 9 years ago
- An x86 linux syscall table reference tool. Handy for when writing shellcode and exploits.☆35Updated 10 years ago
- A Simple ARP Spoofer using Scapy☆107Updated 10 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆60Updated 10 years ago
- Android based APT exploitation framework☆36Updated 10 years ago
- Python In The Middle : a Python implementation of MITM attacks.☆15Updated 10 years ago
- Exploit repository☆202Updated 10 years ago
- Malware Control Monitor☆88Updated 10 years ago
- Windows Crypt API hook to generate weak keys☆47Updated 9 years ago
- Cross Platform Malware Development Framework☆69Updated 10 years ago
- A simple way for detection the remote user's antivirus☆84Updated 9 years ago
- USB Attack to Decrypt Wi-Fi Communications☆32Updated 10 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 10 years ago
- ☆15Updated 5 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆58Updated 10 years ago
- proof of concept to backdoor files from owncloud encryption module☆17Updated 9 years ago
- Linux rootkit and detection examples☆32Updated 10 years ago
- AutoBrowser Screenshot☆49Updated 9 years ago
- Automatic backdooring apk with meterpreter (PoC)☆52Updated 9 years ago